Andrew Dingman, Gianpaolo Russo, Georg Osterholt, Tyler Uffelman, L. Camp
{"title":"海报摘要:好建议只是没有帮助","authors":"Andrew Dingman, Gianpaolo Russo, Georg Osterholt, Tyler Uffelman, L. Camp","doi":"10.1109/IoTDI.2018.00044","DOIUrl":null,"url":null,"abstract":"Guidelines exist for designing less vulnerable \"things\", but how useful are they in practice? To answer this question we present high-level analysis of the state of best practices in Internet of Things. We examined six sets of best practices, combining them into a single set. We then take that union and examine their applicability to three large-scale events. We evaluate if the best practices had been followed, would these have prevented the large scale abuse of IoT devices.","PeriodicalId":149725,"journal":{"name":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Poster Abstract: Good Advice That Just Doesn't Help\",\"authors\":\"Andrew Dingman, Gianpaolo Russo, Georg Osterholt, Tyler Uffelman, L. Camp\",\"doi\":\"10.1109/IoTDI.2018.00044\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Guidelines exist for designing less vulnerable \\\"things\\\", but how useful are they in practice? To answer this question we present high-level analysis of the state of best practices in Internet of Things. We examined six sets of best practices, combining them into a single set. We then take that union and examine their applicability to three large-scale events. We evaluate if the best practices had been followed, would these have prevented the large scale abuse of IoT devices.\",\"PeriodicalId\":149725,\"journal\":{\"name\":\"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IoTDI.2018.00044\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IoTDI.2018.00044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Poster Abstract: Good Advice That Just Doesn't Help
Guidelines exist for designing less vulnerable "things", but how useful are they in practice? To answer this question we present high-level analysis of the state of best practices in Internet of Things. We examined six sets of best practices, combining them into a single set. We then take that union and examine their applicability to three large-scale events. We evaluate if the best practices had been followed, would these have prevented the large scale abuse of IoT devices.